scholarly journals Behavioral responses to a cyber attack in a hospital environment

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Markus Willing ◽  
Christian Dresen ◽  
Eva Gerlitz ◽  
Maximilian Haering ◽  
Matthew Smith ◽  
...  

AbstractTechnical and organizational steps are necessary to mitigate cyber threats and reduce risks. Human behavior is the last line of defense for many hospitals and is considered as equally important as technical security. Medical staff must be properly trained to perform such procedures. This paper presents the first qualitative, interdisciplinary research on how members of an intermediate care unit react to a cyberattack against their patient monitoring equipment. We conducted a simulation in a hospital training environment with 20 intensive care nurses. By the end of the experiment, 12 of the 20 participants realized the monitors’ incorrect behavior. We present a qualitative behavior analysis of high performing participants (HPP) and low performing participants (LPP). The HPP showed fewer signs of stress, were easier on their colleagues, and used analog systems more often than the LPP. With 40% of our participants not recognizing the attack, we see room for improvements through the use of proper tools and provision of adequate training to prepare staff for potential attacks in the future.

1996 ◽  
Vol 2 (4) ◽  
pp. 185-191 ◽  
Author(s):  
W G Scanlon ◽  
N E Evans ◽  
G C Crumley ◽  
Z M Mccreesh

Radio-based signalling devices will play an important role in future generations of remote patient monitoring equipment, both at home and in hospital. Ultimately, it will be possible to sample vital signs from patients, whatever their location and without them necessarily being aware that a measurement is being taken. This paper reviews current methods for the transmission by radio of physiological parameters over ranges of 0.3, 3 and 30 m, and describes the radiofrequency hardware required and the carrier frequencies commonly used. Future developments, including full duplex systems and the use of more advanced modulation schemes, are described. The paper concludes with a case study of a human temperature telemeter built to indicate ovulation. Clinical results clearly show the advantage to be had in adopting radio biotelemetry in this instance.


Author(s):  
Esteban Pino ◽  
Dorothy Curtis ◽  
Thomas Stair ◽  
Lucila Ohno-Machado

Patient monitoring is important in many contexts: at mass-casualty disaster sites, in improvised emergency wards, and in emergency room waiting areas. Given the positive history of use of monitoring systems in the hospital during surgery, in the recovery room, or in an intensive care unit, the authors sought to use recent technological advances to enable patient monitoring in more diverse circumstances: at home, while traveling, and in some less well-monitored areas of a hospital. This chapter presents the authors’ experiences in designing, implementing and deploying a wireless disaster management system prototype in a real hospital environment. In addition to a review of related systems, the sensors, algorithms and infrastructure used in our implementation are presented. Finally, general guidelines for ubiquitous methodologies and tools are shared based on the lessons learned from the actual implementation.


Author(s):  
Esteban Pino ◽  
Dorothy Curtis ◽  
Thomas Stair ◽  
Lucila Ohno-Machado

Patient monitoring is important in many contexts: at mass-casualty disaster sites, in improvised emergency wards, and in emergency room waiting areas. Given the positive history of use of monitoring systems in the hospital during surgery, in the recovery room, or in an intensive care unit, the authors sought to use recent technological advances to enable patient monitoring in more diverse circumstances: at home, while traveling, and in some less well-monitored areas of a hospital. This paper presents the authors’ experiences designing, implementing and deploying a wireless disaster management system prototype in a real hospital environment. In addition to a review of related systems, the sensors, algorithms and infrastructure used in our implementation are presented. Finally, general guidelines for ubiquitous methodologies and tools are shared based on the lessons learned from the actual implementation.


Author(s):  
Esteban Pino ◽  
Dorothy Curtis ◽  
Thomas Stair ◽  
Lucila Ohno-Machado

Patient monitoring is important in many contexts: at mass-casualty disaster sites, in improvised emergency wards, and in emergency room waiting areas. Given the positive history of use of monitoring systems in the hospital during surgery, in the recovery room, or in an intensive care unit, the authors sought to use recent technological advances to enable patient monitoring in more diverse circumstances: at home, while traveling, and in some less well-monitored areas of a hospital. This paper presents the authors’ experiences designing, implementing and deploying a wireless disaster management system prototype in a real hospital environment. In addition to a review of related systems, the sensors, algorithms and infrastructure used in our implementation are presented. Finally, general guidelines for ubiquitous methodologies and tools are shared based on the lessons learned from the actual implementation.


Author(s):  
Shilpadevi Patil ◽  
Sridhar Tirumala ◽  
Harish Siddaiah ◽  
Michael Franklin ◽  
Wesley Day ◽  
...  

1994 ◽  
Vol 33 (01) ◽  
pp. 111-115 ◽  
Author(s):  
P. Laursen

Abstract:Applications are described of the knowledge-representation technique Causal Probabilistic Networks for the detection of events related to the patient and the monitoring equipment, in the context of intensive care patient monitoring. The purpose of the event detection is to reduce the number of false alarms generated by the patient monitor, and to generate alarms related to patient or equipment events rather than to threshold violation. A PC-based system has been developed and tested on patient data. A system for real-time use in patient monitoring is under development.


Author(s):  
Glenn J. Lematta ◽  
Craig J. Johnson ◽  
Erin K. Chiou ◽  
Nancy J. Cooke

Project overview As a team explores interactions, they may find opportunities to expand and refine teamwork over time. This can have consequences for team effectiveness in normal and unexpected situations (Woods, 2018). Understanding the role of exploratory team interactions may be relevant for human-autonomy team (HAT) resilience in the face of synthetic agent rigidity and lack of anticipation (Demir et al, 2019). Team interaction exploration was defined as team interactions with qualities (e.g. content, communication medium) unique to a team’s interaction history (Cooke et al., 2013; Hills et al., 2015). This study examines the relationship between team interaction exploration and HAT performance in multiple remotely-piloted aerial system (RPAS) reconnaissance missions with degraded conditions. The goal of the task was to take good photos of target waypoints. In this task, three teammates are assigned to specific roles: the navigator plans the route using a digital map, the pilot (synthetic) controls the RPAS and selects target waypoints, and the photographer calibrates camera settings to take a good photo of a target waypoint. The synthetic agent was capable of routine team coordination without explicit team player qualities. Teams communicated via a text-chat interface. Seven unique degraded conditions were injected throughout ten missions. Three automation failures disrupted RPAS status information on the photographer’s or pilot’s display, and three autonomy failures disrupted the synthetic agent’s comprehension of waypoint information or caused the agent to move on to the next target before a photo was taken. Finally, a malicious cyber-attack caused the synthetic agent to fly the RPAS to an enemy occupied waypoint. Method Forty-four participants were recruited from a large southwestern university in pairs and formed teams (22 teams) to participate in this study. These participants were either undergraduate or graduate students. This experiment consisted of ten 40-minute missions in total that were carried out over two sessions separated by one-to two-week intervals. After a baseline mission, an automation and autonomy failure was injected into each mission while the team processed target waypoints. The malicious cyber-attack occurred during the final 20-minutes of the tenth mission. This study collected a several measures including measures of team process, physiological measures, and surveys of teamwork knowledge, trust, workload, and anthropomorphism which are not considered in this study. Exploratory team interaction was operationalized as any text-message unique in content, sender, or recipient that was unrelated to routine coordination of target waypoints. Teams were grouped using k-means clustering by their target processing efficiency, number of overcome roadblocks, and mission performance. The three clusters ( K = 3) were comparatively described as low- ( N = 7), middle- ( N = 7), and high-performing ( N = 5) teams. A mixed-factor ANOVA compared the frequency of each team’s exploratory interactions by mission and cluster. Results and discussion High-performing teams were distinguished from middle-and low-performing teams in their ability to maintain high levels of overall performance while efficiently processing targets and overcoming many roadblocks. Middle-performing teams were efficient in overcoming roadblocks but had worse mission performance. The findings indicate that 1) high-performing teams explored team interactions more than middle-performing teams, 2) there was no significant difference in exploration frequency between high-and low-performing teams, and 3) teams explored more in the first session than the second session, with the exception of the final mission. Overall, exploratory team interaction differentiated HAT performance in normal and degraded conditions and should be further examined at other levels of interaction, such as content meaning and interaction patterns.


2017 ◽  
Author(s):  
Hilary Madder ◽  
Ian Moir ◽  
Ruth Moroney ◽  
Lisa Butcher ◽  
Robert Newnham ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document